Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Theses and Dissertations

Computer Sciences

Institution
Keyword
Publication Year

Articles 1 - 30 of 2307

Full-Text Articles in Entire DC Network

Mri Image Regression Cnn For Bone Marrow Lesion Volume Prediction, Kevin Yanagisawa Feb 2024

Mri Image Regression Cnn For Bone Marrow Lesion Volume Prediction, Kevin Yanagisawa

Theses and Dissertations

Bone marrow lesions (BMLs), occurs from fluid build up in the soft tissues inside your bone. This can be seen on magnetic resonance imaging (MRI) scans and is characterized by excess water signals in the bone marrow space. This disease is commonly caused by osteoarthritis (OA), a degenerative join disease where tissues within the joint breakdown over time [1]. These BMLs are an emerging target for OA, as they are commonly related to pain and worsening of the diseased area until surgical intervention is required [2]–[4]. In order to assess the BMLs, MRIs were utilized as input into a regression …


Adaptive Multi-Label Classification On Drifting Data Streams, Martha Roseberry Jan 2024

Adaptive Multi-Label Classification On Drifting Data Streams, Martha Roseberry

Theses and Dissertations

Drifting data streams and multi-label data are both challenging problems. When multi-label data arrives as a stream, the challenges of both problems must be addressed along with additional challenges unique to the combined problem. Algorithms must be fast and flexible, able to match both the speed and evolving nature of the stream. We propose four methods for learning from multi-label drifting data streams. First, a multi-label k Nearest Neighbors with Self Adjusting Memory (ML-SAM-kNN) exploits short- and long-term memories to predict the current and evolving states of the data stream. Second, a punitive k nearest neighbors algorithm with a self-adjusting …


Graph Coloring Reconfiguration, Reem Mahmoud Jan 2024

Graph Coloring Reconfiguration, Reem Mahmoud

Theses and Dissertations

Reconfiguration is the concept of moving between different solutions to a problem by transforming one solution into another using some prescribed transformation rule (move). Given two solutions s1 and s2 of a problem, reconfiguration asks whether there exists a sequence of moves which transforms s1 into s2. Reconfiguration is an area of research with many contributions towards various fields such as mathematics and computer science.
The k-coloring reconfiguration problem asks whether there exists a sequence of moves which transforms one k-coloring of a graph G into another. A move in this case is a type …


Towards Energy-Efficient Edge Computing For Tiny Ai Applications, Vamsi Krishna Bhagavathula Jan 2024

Towards Energy-Efficient Edge Computing For Tiny Ai Applications, Vamsi Krishna Bhagavathula

Theses and Dissertations

As artificial intelligence (AI) applications become more common on the edge of networks, like Raspberry Pi servers, it is crucial to optimize their energy use. This research project investigates how AI algorithms affect energy efficiency and resource usage on Raspberry Pi servers. Two models were created: one predicts resource usage, and the other predicts power consumption of AI algorithms on Raspberry Pi. Several factors are considered like CPU and memory use, algorithm speed, dataset size, and types of algorithms and datasets. Using regression-based methods, we model how these factors affect energy use. By converting categorical factors into numerical ones, we …


Designing An Artificial Immune Inspired Intrusion Detection System, William Hosier Anderson Dec 2023

Designing An Artificial Immune Inspired Intrusion Detection System, William Hosier Anderson

Theses and Dissertations

The domain of Intrusion Detection Systems (IDS) has witnessed growing interest in recent years due to the escalating threats posed by cyberattacks. As Internet of Things (IoT) becomes increasingly integrated into our every day lives, we widen our attack surface and expose more of our personal lives to risk. In the same way the Human Immune System (HIS) safeguards our physical self, a similar solution is needed to safeguard our digital self. This thesis presents the Artificial Immune inspired Intrusion Detection System (AIS-IDS), an IDS modeled after the HIS. This thesis proposes an architecture for AIS-IDS, instantiates an AIS-IDS model …


A Conceptual Decentralized Identity Solution For State Government, Martin Duclos Dec 2023

A Conceptual Decentralized Identity Solution For State Government, Martin Duclos

Theses and Dissertations

In recent years, state governments, exemplified by Mississippi, have significantly expanded their online service offerings to reduce costs and improve efficiency. However, this shift has led to challenges in managing digital identities effectively, with multiple fragmented solutions in use. This paper proposes a Self-Sovereign Identity (SSI) framework based on distributed ledger technology. SSI grants individuals control over their digital identities, enhancing privacy and security without relying on a centralized authority. The contributions of this research include increased efficiency, improved privacy and security, enhanced user satisfaction, and reduced costs in state government digital identity management. The paper provides background on digital …


Study Of Augmentations On Historical Manuscripts Using Trocr, Erez Meoded Dec 2023

Study Of Augmentations On Historical Manuscripts Using Trocr, Erez Meoded

Theses and Dissertations

Historical manuscripts are an essential source of original content. For many reasons, it is hard to recognize these manuscripts as text. This thesis used a state-of-the-art Handwritten Text Recognizer, TrOCR, to recognize a 16th-century manuscript. TrOCR uses a vision transformer to encode the input images and a language transformer to decode them back to text. We showed that carefully preprocessed images and designed augmentations can improve the performance of TrOCR. We suggest an ensemble of augmented models to achieve an even better performance.


Phenotyping Cotton Compactness Using Machine Learning And Uas Multispectral Imagery, Joshua Carl Waldbieser Dec 2023

Phenotyping Cotton Compactness Using Machine Learning And Uas Multispectral Imagery, Joshua Carl Waldbieser

Theses and Dissertations

Breeding compact cotton plants is desirable for many reasons, but current research for this is restricted by manual data collection. Using unmanned aircraft system imagery shows potential for high-throughput automation of this process. Using multispectral orthomosaics and ground truth measurements, I developed supervised models with a wide range of hyperparameters to predict three compactness traits. Extreme gradient boosting using a feature matrix as input was able to predict the height-related metric with R2=0.829 and RMSE=0.331. The breadth metrics require higher-detailed data and more complex models to predict accurately.


Private Ethereum Blockchain Implementation And Its Security Features For Smart Home Iot, Hasibul Grande Alam Dec 2023

Private Ethereum Blockchain Implementation And Its Security Features For Smart Home Iot, Hasibul Grande Alam

Theses and Dissertations

The security and privacy of IoT devices have become primary concerns as smart home networks are connected to the internet. Ethereum blockchain can be a solution to mitigate or prevent attacks – sniffing attacks, malware attacks, Eavesdropping, and Distributed Denial of Services (DDoS) attacks. Deploying Ethereum in resource constraint IoT devices is challenging due to resultant energy consumption, computational overhead, and delay. We adopted smart home as a case study to examine our methodology as a model for general IoT applications. This thesis work presents the implementation of private Ethereum blockchain that is optimized and installable on smart home IoT. …


Enhancing Time Series Hashing Performance Via Deep Orthogonal Hashing, Mahmudul Hasan Robin Dec 2023

Enhancing Time Series Hashing Performance Via Deep Orthogonal Hashing, Mahmudul Hasan Robin

Theses and Dissertations

Deep hashing has been widely used for efficient retrieval and classification of high-dimensional data like images and text. However, its application to time series data is still challenging due to the data’s temporal nature. To tackle this issue, a new deep hashing method has been proposed that generates efficient hash codes and enhances the time series hashing performance using a ResNet model with Orthohash (Cosine Similarity Loss). The proposed method uses one loss architecture while using ResNet model for efficient hashing. It uses the Character Trajectories dataset to extract discriminative features from the time series data. These features are then …


Robust And Uncertainty-Aware Image Classification Using Bayesian Vision Transformer Model, Fazlur Rahman Bin Karim Dec 2023

Robust And Uncertainty-Aware Image Classification Using Bayesian Vision Transformer Model, Fazlur Rahman Bin Karim

Theses and Dissertations

Transformer Neural Networks have emerged as the predominant architecture for addressing a wide range of Natural Language Processing (NLP) applications such as machine translation, speech recognition, sentiment analysis, text anomaly detection, etc. This noteworthy achievement of Transformer Neural Networks in the NLP field has sparked a growing interest in integrating and utilizing Transformer models in computer vision tasks. The Vision Transformer (ViT) model efficiently captures long-range dependencies by employing a self-attention mechanism to transform different image data into meaningful, significant representations. Recently, the Vision Transformer (ViT) has exhibited incredible performance in solving image classification problems by utilizing ViT models, thereby …


Automated Human Activity Recognition From Controlled Environment Videos, Pranay Mandadapu Dec 2023

Automated Human Activity Recognition From Controlled Environment Videos, Pranay Mandadapu

Theses and Dissertations

This thesis explores deep learning methods for Human Activity Recognition (HAR) from videos to automate the annotation of human activities in videos. The research is particularly relevant for continuous monitoring in healthcare settings such as nursing homes and hospitals. The innovative part of the approach lies in using YOLO models to first detect humans in video frames and then isolating them from the rest of the image for activity recognition which leads to an improvement in accuracy. The study employs pre-trained deep residual networks, such as ResNet50, ResNet152-V2, and Inception-ResNetV2, which were found to work better than custom CNN-based models. …


Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad Dec 2023

Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad

Theses and Dissertations

Running computer vision algorithms requires complex devices with lots of computing power, these types of devices are not well suited for space deployment. The harsh radiation environment and limited power budgets have hindered the ability of running advanced computer vision algorithms in space. This problem makes running an on-orbit servicing detection algorithm very difficult. This work proposes using a low powered FPGA to accelerate the computer vision algorithms that enable satellite component feature extraction. This work uses AMD/Xilinx’s Zynq SoC and DPU IP to run model inference. Experiments in this work centered around improving model post processing by creating implementations …


Use Of Digital Twins To Mitigate Communication Failures In Microgrids, Andrew Eggebeen Dec 2023

Use Of Digital Twins To Mitigate Communication Failures In Microgrids, Andrew Eggebeen

Theses and Dissertations

This work investigates digital twin (DT) applications for electric power system (EPS) resilience. A novel DT architecture is proposed consisting of a physical twin, a virtual twin, an intelligent agent, and data communications. Requirements for the virtual twin are identified. Guidelines are provided for generating, capturing, and storing data to train the intelligent agent. The relationship between the DT development process and an existing controller hardware-in-the-loop (CHIL) process is discussed. To demonstrate the proposed DT architecture and development process, a DT for a battery energy storage system (BESS) is created based on the simulation of an industrial nanogrid. The creation …


Anxiety In International Graduate Students With U.S. Education, Aeshah Zarraa Dec 2023

Anxiety In International Graduate Students With U.S. Education, Aeshah Zarraa

Theses and Dissertations

Anxiety in international graduate students is a significant concern for most students planning to move out of their home country to pursue higher education in the United States. The primary purpose of this research is to identify the prime causes of anxiety triggers in the targetted Graduate students, thereby determining a step-wise methodology development to address the causes. The study initially identified a set of graduate students who were voluntarily willing to collaborate and address their concerns anonymously to identify the significant issues faced by current students and alumni of the Florida Institute of Technology, Melbourne, Florida. Several questions were …


Intellibeehive, Christian Ivan Narcia-Macias Dec 2023

Intellibeehive, Christian Ivan Narcia-Macias

Theses and Dissertations

Utilizing computer vision and the latest technological advancements, in this study, we developed a honey bee monitoring system that aims to enhance our understanding of Colony Collapse Disorder, honey bee behavior, population decline, and overall hive health. The system is positioned at the hive entrance providing real-time data, enabling beekeepers to closely monitor the hive's activity and health through an account-based website. Using machine learning, our monitoring system can accurately track honey bees, monitor pollen-gathering activity, and detect Varroa mites, all without causing any disruption to the honey bees. Moreover, we have ensured that the development of this monitoring system …


Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya Dec 2023

Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya

Theses and Dissertations

High-performance reconfigurable computers (HPRCs) make use of Field-Programmable Gate Arrays (FPGAs) for efficient emulation of quantum algorithms. Generally, algorithm-specific architectures are implemented on the FPGAs and there is very little flexibility. Moreover, mapping a quantum algorithm onto its equivalent FPGA emulation architecture is challenging. In this work, we present an automation framework for converting quantum circuits to their equivalent FPGA emulation architectures. The framework processes quantum circuits represented in Quantum Assembly Language (QASM) and derives high-level descriptions of the hardware emulation architectures for High-Level Synthesis (HLS) on HPRCs. The framework generates the code for a heterogeneous architecture consisting of a …


Statically Scheduling Circular Remote Attribute Grammars, Seyedamirhossein Hesamian Dec 2023

Statically Scheduling Circular Remote Attribute Grammars, Seyedamirhossein Hesamian

Theses and Dissertations

Classical attribute grammars invented by Knuth have been the subject of extensive study. Over the years there have been various extensions introduced, each with the goal of making attribute grammar more useful for applications such as program analysis. The first extension described here is circular attribute grammar by Farrow. It is followed by remote attribute grammar, which was introduced separately by Boyland and Hedin. More recently, Hedin introduced circular remote attribute grammars and a proof of concept implementation with demand evaluation. Remote attribute grammars make it possible for semantic rules to access attributes of nodes that are not local, and …


Big Data Applications And Challenges In Giscience (Case Studies: Natural Disaster And Public Health Crisis Management), Amir Masoud Forati Dec 2023

Big Data Applications And Challenges In Giscience (Case Studies: Natural Disaster And Public Health Crisis Management), Amir Masoud Forati

Theses and Dissertations

This dissertation examines the application and significance of user-generated big data in Geographic Information Science (GIScience), with a focus on managing natural disasters and public health crises. It explores the role of social media data in understanding human-environment interactions and in informing disaster management and public health strategies. A scalable computational framework will be developed to model extensive unstructured geotagged data from social media, facilitating systematic spatiotemporal data analysis.The research investigates how individuals and communities respond to high-impact events like natural disasters and public health emergencies, employing both qualitative and quantitative methods. In particular, it assesses the impact of socio-economic-demographic …


A Design Strategy To Improve Machine Learning Resiliency Of Physically Unclonable Functions Using Modulus Process, Yuqiu Jiang Dec 2023

A Design Strategy To Improve Machine Learning Resiliency Of Physically Unclonable Functions Using Modulus Process, Yuqiu Jiang

Theses and Dissertations

Physically unclonable functions (PUFs) are hardware security primitives that utilize non-reproducible manufacturing variations to provide device-specific challenge-response pairs (CRPs). Such primitives are desirable for applications such as communication and intellectual property protection. PUFs have been gaining considerable interest from both the academic and industrial communities because of their simplicity and stability. However, many recent studies have exposed PUFs to machine-learning (ML) modeling attacks. To improve the resilience of a system to general ML attacks instead of a specific ML technique, a common solution is to improve the complexity of the system. Structures, such as XOR-PUFs, can significantly increase the nonlinearity …


Enhancing Inter-Document Similarity Using Sub Max, Richard Imorobebh Igbiriki Nov 2023

Enhancing Inter-Document Similarity Using Sub Max, Richard Imorobebh Igbiriki

Theses and Dissertations

Document similarity, a core theme in Information Retrieval (IR), is a machine learning (ML) task associated with natural language processing (NLP). It is a measure of the distance between two documents given a set of rules. For the purpose of this thesis, two documents are similar if they are semantically alike, and describe similar concepts. While document similarity can be applied to multiple tasks, we focus our work on the accuracy of models in detecting referenced papers as similar documents using their sub max similarity. Multiple approaches have been used to determine the similarity of documents in regards to literature …


Smart Homes And You: Iot Device Data Risks In An Ever-Changing World, Autumn Person Oct 2023

Smart Homes And You: Iot Device Data Risks In An Ever-Changing World, Autumn Person

Theses and Dissertations

Social media applications are increasingly seen as a national security threat and a cause for concern because they can be used to create user profiles on government personnel and on US citizens. These profiles could be used for big data and artificial intelligence purposes of interest to foreign governments. With the rise of big data and AI being used, foreign governments could use this data for a variety of purposes that can affect normal everyday citizens, not just high value personnel. IoT (Internet of Things) devices that the population uses everyday can also pose the same threat. These devices can …


Docker Technology For Small Scenario-Based Excercises In Cybersecurity, Zeinab Ahmed Oct 2023

Docker Technology For Small Scenario-Based Excercises In Cybersecurity, Zeinab Ahmed

Theses and Dissertations

This study aims to better prepare students for cybersecurity roles by providing practical tools that bridge the gap between theory and real-world applications. We investigate the role of small scenario-based exercises for students’ understanding of cybersecurity concepts. In particular, we assess the use of Docker technology to deliver training that includes a simple small scenario on html code injection. The effectiveness of scenario-based learning has long been defined and by using SBL, we are going to create hands-on activity that involves the fundamental topics in cybersecurity using Docker technology, allowing students to see the exploitation of the vulnerabilities and defense …


Machine Learning And Causality For Interpretable And Automated Decision Making, Maria Lentini Sep 2023

Machine Learning And Causality For Interpretable And Automated Decision Making, Maria Lentini

Theses and Dissertations

This abstract explores two key areas in decision science: automated and interpretable decision making. In the first part, we address challenges related to sparse user interaction data and high item turnover rates in recommender systems. We introduce a novel algorithm called Multi-View Interactive Collaborative Filtering (MV-ICTR) that integrates user-item ratings and contextual information, improving performance, particularly for cold-start scenarios. In the second part, we focus on Student Prescription Trees (SPTs), which are interpretable decision trees. These trees use a black box "teacher" model to predict counterfactuals based on observed covariates. We experiment with a Bayesian hierarchical binomial regression model as …


Identity Management Pki System Using Blockchain, Mohamed Abdel Fattah Abdel Baki Awad Sep 2023

Identity Management Pki System Using Blockchain, Mohamed Abdel Fattah Abdel Baki Awad

Theses and Dissertations

Identity management is one of the most important topics in the security field. Public Key Infrastructure (PKI) is the most commonly used approach in legally identity management systems. PKI systems have many centralized services that might affect the availability and trustworthiness of the system. Issues related to certificate verification methods such as Certificate Revocation List (CRL) and Online Certificate Status Protocol (OCSP) can be avoided if blockchain is used. Blockchain is a decentralized trusted system where data can only be appended to a public ledger. Edits are not allowed in blockchain. Blockchain consists of several nodes all of them have …


Visual And Spatial Audio Mismatching In Virtual Environments, Zachary Lawrence Garris Aug 2023

Visual And Spatial Audio Mismatching In Virtual Environments, Zachary Lawrence Garris

Theses and Dissertations

This paper explores how vision affects spatial audio perception in virtual reality. We created four virtual environments with different reverb and room sizes, and recorded binaural clicks in each one. We conducted two experiments: one where participants judged the audio-visual match, and another where they pointed to the click direction. We found that vision influences spatial audio perception and that congruent audio-visual cues improve accuracy. We suggest some implications for virtual reality design and evaluation.


Expanding One-Dimensional Game Theory-Based Group Decision Models: Extension To N-Dimension And Integration Of Distributed Position Function, Mirhossein Mousavi Karimi Aug 2023

Expanding One-Dimensional Game Theory-Based Group Decision Models: Extension To N-Dimension And Integration Of Distributed Position Function, Mirhossein Mousavi Karimi

Theses and Dissertations

This dissertation aims to expand the current one-dimensional game theory based model to a multidimensional model for multi-actor predictive analytics and generalize the concept of position to address problems where actors’ positions are distributed over a position spectrum. The one-dimensional models are used for the problems where actors are interacting in a single issue space only. This is less than an ideal assumption since, in most cases, players’ strategies may depend on the dynamics of multiple issues when dealing with other players. In this research, the one-dimensional model is expanded to N-Dimensional model by considering different positions, and separate salience …


Signings Of Graphs And Sign-Symmetric Signed Graphs, Ahmad Asiri Aug 2023

Signings Of Graphs And Sign-Symmetric Signed Graphs, Ahmad Asiri

Theses and Dissertations

In this dissertation, we investigate various aspects of signed graphs, with a particular focus on signings and sign-symmetric signed graphs. We begin by examining the complete graph on six vertices with one edge deleted ($K_6$\textbackslash e) and explore the different ways of signing this graph up to switching isomorphism. We determine the frustration index (number) of these signings and investigate the existence of sign-symmetric signed graphs. We then extend our study to the $K_6$\textbackslash 2e graph and the McGee graph with exactly two negative edges. We investigate the distinct ways of signing these graphs up to switching isomorphism and demonstrate …


Simulating Motion Success With Muscle Deficiency In A Musculoskeletal Model Using Reinforcement Learning, Daniel Castillo Aug 2023

Simulating Motion Success With Muscle Deficiency In A Musculoskeletal Model Using Reinforcement Learning, Daniel Castillo

Theses and Dissertations

Humans possess an extraordinary ability to execute complex movements, captivating the attention of researchers who strive to develop methods for simulating these actions within a physics-based environment. Motion Capture data stands out as a crucial tool among the proven approaches to tackle this challenge. In this research, we explore the effects of decreased muscle force on the body's capacity to perform various tasks, ranging from simple walking to executing complex jumping jacks. Through a systematic reduction of the allowed force applied to individual muscles or muscle groups, we aim to identify the threshold at which the body's muscles tolerate the …


Invading The Integrity Of Deep Learning (Dl) Models Using Lsb Perturbation & Pixel Manipulation, Ashraful Tauhid Aug 2023

Invading The Integrity Of Deep Learning (Dl) Models Using Lsb Perturbation & Pixel Manipulation, Ashraful Tauhid

Theses and Dissertations

The use of deep learning (DL) models for solving classification and recognition-related problems are expanding at an exponential rate. However, these models are computationally expensive both in terms of time and resources. This imposes an entry barrier for low-profile businesses and scientific research projects with limited resources. Therefore, many organizations prefer to use fully outsourced trained models, cloud computing services, pre-trained models are available for download and transfer learning. This ubiquitous adoption of DL has unlocked numerous opportunities but has also brought forth potential threats to its prospects. Among the security threats, backdoor attacks and adversarial attacks have emerged as …